9hfuleqnrlml5uhh9ilx Signature Poli 180418063756
9hfuleqnrlml5uhh9ilx Signature Poli 180418063756
Technology
Now would that mean that someone say alice tries to make a face
copy of transaction that some has sent him 20 dollars , and add
Digital Signature
A digital signature contains a public and a private key so that every person can
sign a block using his private key and the data in it .
And all the other member can use his public key to ensure that the block is valid
and is generated by an authentic user
Now your would be wondering that what if someone guesses signature value and
tampers with it
Private key and Public key
There are various algorithms that define 2 keys one is named as public key and
the other is defined as a private key.
1. RSA
2. EDSC
3. DH
Consider EDSC that creates 256 bits key, so in order to guess this signature a
computer has to generate all the permutations which is about 2^256
combinations . This is too much for even a ton of supercomputers to crack.
Hash Functions or Digest
These are the functions that generate values which are related to the message
used in it
Even if i slightly change the message the whole hash changes . so there is no way
of getting the message back from the hash.
Proof of work
To get the authenticity of every block you need to solve or get the mathematical
hash of the whole block
Certainly every block contains the hash of the previous block . So in order to
confirm the current block one should have already verified the previous blocks.
These require certain computational power. For giving this computational power
and verifying the ledger the user is awarded with some bitcoins that are generated
from thin air .
This also prevents anyone to tamper with the data , if anyone does tamper with
one block then he has to calculate all the proof of work for the the respective
blocks in the chain. This is impossible for even tons of supercomputers .
The one underlying factor that cannot make alice fraud a transaction or create a
fraud chain is that only the majority chain is considered to be valid .
To fraud a chain you have to create 51 percent of the majority which is like
tackling 50 percent of the computers world wide .
Uses
Cryptocurrency
Decentralized Notary
Medical Records
Artificial Intelligence
Digital Voting
Smart Contracts